Received: by 2002:a05:6a10:d5a5:0:0:0:0 with SMTP id gn37csp4070287pxb; Mon, 4 Oct 2021 16:45:23 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwniChbAt6Emf/K2e61VQpdYyk3MqEjGzsSNnyYKBGFDxHBnjB4PQ25OKj3tU0Y8L7VJLDr X-Received: by 2002:a17:90b:3ec3:: with SMTP id rm3mr4207461pjb.186.1633391122855; Mon, 04 Oct 2021 16:45:22 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1633391122; cv=none; d=google.com; s=arc-20160816; b=VBODxTDHWMHKTM4l+lBlq5x3QLtP4R+Z5RnCTWWTIKi66mN14ra/QbVgyqCwmbCDmN rT0dUpc0EArzVp+HTXYwO9/pEBjKIOgWxgXApzgbfqJRVS1aaa0srn3q2uEmfzsrv1kw ZGY9zXIqNdmG3LzaiJ9oagXuW22R4Jc9Vty252PcUdk7SA98Qm7LBeNjU8hPYjjgWcwH 247tZa9fHfx/yyYRXoq1a9yh2Jb1afm483UPcLult3GRGRJ29UHUSIw38Jz1hKbqH64d UgY0tl9VUX1LQZtBdI8Wp0EQ7Y7Nyrg6cgoIxwhlRC9GlR36SaJdK/SBOlPTDAGjXmZm y17w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=uKETvstsIU7otGNCWLQwqMCZS2fEN/AusloL76ML5ro=; b=BASUsQ69tZB8ubty2K2YMovkRmkhMUDd1eR8cC8J5alcOdjaJL/qmRBQIuH4GNbbtC cyJkGWg3IoGHY4pjtyboJyzjnvqfuYaCqzwZHRod2eBvOThD6z3Tl8NVc5c3EYm02wtB sno7gmtwCgYPVEwHvKCZU4RQtQ5SarIlUOJR2tzj9BSzhHc5spO1s4sCTBbu3GLhB+Bw Qv+kwukKDzl/VWfVx54IPEMK4p/9qaLTlGuSUkoSDgPvAp05X+do6aq137rFkJnqtlzB W+XyAx8kfAwEIGujlTGk+pB6vVUPY4ciXi5lWnOJ4q7VmzYebCMYinxZ37Pqn8y3jp5A nJgQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id n2si18223321pjh.91.2021.10.04.16.45.09; Mon, 04 Oct 2021 16:45:22 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236209AbhJDUZN (ORCPT + 99 others); Mon, 4 Oct 2021 16:25:13 -0400 Received: from foss.arm.com ([217.140.110.172]:36046 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236281AbhJDUZH (ORCPT ); Mon, 4 Oct 2021 16:25:07 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 498D9D6E; Mon, 4 Oct 2021 13:23:18 -0700 (PDT) Received: from e119884-lin.cambridge.arm.com (e119884-lin.cambridge.arm.com [10.1.196.72]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 61FB43F70D; Mon, 4 Oct 2021 13:23:16 -0700 (PDT) From: Vincenzo Frascino To: linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, kasan-dev@googlegroups.com Cc: vincenzo.frascino@arm.com, Andrew Morton , Catalin Marinas , Will Deacon , Dmitry Vyukov , Andrey Ryabinin , Alexander Potapenko , Marco Elver , Evgenii Stepanov , Branislav Rankov , Andrey Konovalov , Lorenzo Pieralisi Subject: [PATCH v2 4/5] arm64: mte: Add asymmetric mode support Date: Mon, 4 Oct 2021 21:22:52 +0100 Message-Id: <20211004202253.27857-5-vincenzo.frascino@arm.com> X-Mailer: git-send-email 2.33.0 In-Reply-To: <20211004202253.27857-1-vincenzo.frascino@arm.com> References: <20211004202253.27857-1-vincenzo.frascino@arm.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org MTE provides an asymmetric mode for detecting tag exceptions. In particular, when such a mode is present, the CPU triggers a fault on a tag mismatch during a load operation and asynchronously updates a register when a tag mismatch is detected during a store operation. Add support for MTE asymmetric mode. Note: If the CPU does not support MTE asymmetric mode the kernel falls back on synchronous mode which is the default for kasan=on. Cc: Will Deacon Cc: Catalin Marinas Cc: Andrey Konovalov Signed-off-by: Vincenzo Frascino Reviewed-by: Catalin Marinas --- arch/arm64/include/asm/memory.h | 1 + arch/arm64/include/asm/mte-kasan.h | 5 +++++ arch/arm64/kernel/mte.c | 33 +++++++++++++++++++++++++++++- 3 files changed, 38 insertions(+), 1 deletion(-) diff --git a/arch/arm64/include/asm/memory.h b/arch/arm64/include/asm/memory.h index f1745a843414..1b9a1e242612 100644 --- a/arch/arm64/include/asm/memory.h +++ b/arch/arm64/include/asm/memory.h @@ -243,6 +243,7 @@ static inline const void *__tag_set(const void *addr, u8 tag) #ifdef CONFIG_KASAN_HW_TAGS #define arch_enable_tagging_sync() mte_enable_kernel_sync() #define arch_enable_tagging_async() mte_enable_kernel_async() +#define arch_enable_tagging_asymm() mte_enable_kernel_asymm() #define arch_force_async_tag_fault() mte_check_tfsr_exit() #define arch_get_random_tag() mte_get_random_tag() #define arch_get_mem_tag(addr) mte_get_mem_tag(addr) diff --git a/arch/arm64/include/asm/mte-kasan.h b/arch/arm64/include/asm/mte-kasan.h index 22420e1f8c03..478b9bcf69ad 100644 --- a/arch/arm64/include/asm/mte-kasan.h +++ b/arch/arm64/include/asm/mte-kasan.h @@ -130,6 +130,7 @@ static inline void mte_set_mem_tag_range(void *addr, size_t size, u8 tag, void mte_enable_kernel_sync(void); void mte_enable_kernel_async(void); +void mte_enable_kernel_asymm(void); #else /* CONFIG_ARM64_MTE */ @@ -161,6 +162,10 @@ static inline void mte_enable_kernel_async(void) { } +static inline void mte_enable_kernel_asymm(void) +{ +} + #endif /* CONFIG_ARM64_MTE */ #endif /* __ASSEMBLY__ */ diff --git a/arch/arm64/kernel/mte.c b/arch/arm64/kernel/mte.c index e5e801bc5312..b6ad6b861c25 100644 --- a/arch/arm64/kernel/mte.c +++ b/arch/arm64/kernel/mte.c @@ -26,7 +26,12 @@ static DEFINE_PER_CPU_READ_MOSTLY(u64, mte_tcf_preferred); #ifdef CONFIG_KASAN_HW_TAGS -/* Whether the MTE asynchronous mode is enabled. */ +/* + * The MTE asynchronous and asymmetric mode have the same + * behavior for the store operations. + * + * Whether the MTE asynchronous or asymmetric mode is enabled. + */ DEFINE_STATIC_KEY_FALSE(mte_async_mode); EXPORT_SYMBOL_GPL(mte_async_mode); #endif @@ -137,6 +142,32 @@ void mte_enable_kernel_async(void) if (!system_uses_mte_async_mode()) static_branch_enable(&mte_async_mode); } + +void mte_enable_kernel_asymm(void) +{ + if (cpus_have_cap(ARM64_MTE_ASYMM)) { + __mte_enable_kernel("asymmetric", SCTLR_ELx_TCF_ASYMM); + + /* + * MTE asymm mode behaves as async mode for store + * operations. The mode is set system wide by the + * first PE that executes this function. + * + * Note: If in future KASAN acquires a runtime switching + * mode in between sync and async, this strategy needs + * to be reviewed. + */ + if (!system_uses_mte_async_mode()) + static_branch_enable(&mte_async_mode); + } else { + /* + * If the CPU does not support MTE asymmetric mode the + * kernel falls back on synchronous mode which is the + * default for kasan=on. + */ + mte_enable_kernel_sync(); + } +} #endif #ifdef CONFIG_KASAN_HW_TAGS -- 2.33.0